| Peer-Reviewed

Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II)

Received: 17 March 2021    Accepted: 29 March 2021    Published: 22 June 2021
Views:       Downloads:
Abstract

Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify and describe intricate information system. An access Control mechanism is a main strategy for prevention and protection of the classified files in a database; this is carried out by restricting rights of access for different approved users of these files. This paper proposes a novel access control mechanism based on Chinese remainder theorem II which implements a single-key-lock system to encrypt one key called a secret key which is used for both encryption and decryption in the electronic information system for accessing the database. The key to be used in the decryption process must be exchanged between the entities in communication using symmetric encryption for the users to have access to the database. This method represents flocks and keys which is highly efficient and proficient. Also, this implementation can be achieved using the Chinese remainder theorem which executes faster operations and enables simpler construction of keys and locks to be provide for user to have access to control.

Published in International Journal of Intelligent Information Systems (Volume 10, Issue 3)
DOI 10.11648/j.ijiis.20211003.12
Page(s) 31-36
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Access Control, Residue Number System (RNS), New Chinese Remainder Theorem II (New CRT II)

References
[1] D. E. Derming and P. J. Denning, “Data Security,” ACM Comp. Survey, Vol. 1 No. 3, (1979), pp 227-249.
[2] B. W. Lampson ‘Protection” Proc. 5th Princeton Sytnp. of Info. Sci. and Syst., Princeton Univ., (1971), pp. 437-443.
[3] G. S. Graharn and P. L. Denning, “protection-principles and practice,” Proc. Spring Jt. Computer Coference, Vol. 40, AFIPS Press, Montvale, N. J., (1972), pp. 417-29.
[4] Kim S. Lee et al. A Hierarchical Single-Key-Lock Access Control Using the Chinese Remainder Theorem. ACM 1992.
[5] Baumann, A., Peinado, M., & Hunt, G. (2015). Shielding applications from an untrusted cloud with haven. ACM Transactions on Computer Systems (TOCS), 33 (3), 1-26.
[6] M. L. Wu, T. Y. Hwang, Access control with single-key-lock, IEEE Trans. Software Eng. 10 (2) (1994) 185-191.
[7] Yanjun Liu, Chin-Chen, and Shih-Chang Chang, An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem. International Journal of Network Security, Vol. 16, No. 1, PP. 58-64, Jan. 2014.
[8] Anderson R. Security Engineering: a guide to building dependable distributed systems. John Wiley & Sons; 2010. p. 640.
[9] Younis A. Younis, KashifKifayat, MadjidMerabti. An access control model for cloud computing. journal of information security and aplications 19 (2014) 45-60. Elsevier Ltd.
[10] Vilardy, J. M., Giacometto, F., Torres, C. O., & Mattos, L. (2011, January). Design and implementation in VHDL code of the two-dimensional fast Fourier transform for frequency filtering, convolution and correlation operations. In Journal of Physics-Conference Series (Vol. 274, No. 1, p. 012048).
[11] Ouyang, J., Coatrieux, G., & Shu, H. (2015). Robust hashing for image authentication using quaternion discrete Fourier transform and log-polar transform. Digital Signal Processing, 41, 98-109.
[12] Chervyakov, N. I., Molahosseini, A. S., Lyakhov, P. A., Babenko, M. G., & Deryabin, M. A. (2017). Residue-to-binary conversion for general moduli sets based on approximate Chinese remainder theorem. International journal of computer mathematics, 94 (9), 1833-1849.
[13] C. H., Premkumar, A. B., & Zhang, W. (2013). A new RNS based DA approach for inner product computation. IEEE Transactions on Circuits and Systems I: Regular Papers, 60 (8), 2139-2152. Omondi A. and Premkumar B (2007): Residue Number Systems: Theory and Implementation. Imperial College Press, 2007.
[14] Ouye, M. M., & Crocker, S. T. (2018). U.S. Patent No. 10,033,700. Washington, DC: U.S. Patent and Trademark Office.
Cite This Article
  • APA Style

    Aremu Idris Aremu, Ibitoye Akinfola Akinrinnola, Nwaocha Vivian Ogochukwu. (2021). Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II). International Journal of Intelligent Information Systems, 10(3), 31-36. https://doi.org/10.11648/j.ijiis.20211003.12

    Copy | Download

    ACS Style

    Aremu Idris Aremu; Ibitoye Akinfola Akinrinnola; Nwaocha Vivian Ogochukwu. Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II). Int. J. Intell. Inf. Syst. 2021, 10(3), 31-36. doi: 10.11648/j.ijiis.20211003.12

    Copy | Download

    AMA Style

    Aremu Idris Aremu, Ibitoye Akinfola Akinrinnola, Nwaocha Vivian Ogochukwu. Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II). Int J Intell Inf Syst. 2021;10(3):31-36. doi: 10.11648/j.ijiis.20211003.12

    Copy | Download

  • @article{10.11648/j.ijiis.20211003.12,
      author = {Aremu Idris Aremu and Ibitoye Akinfola Akinrinnola and Nwaocha Vivian Ogochukwu},
      title = {Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II)},
      journal = {International Journal of Intelligent Information Systems},
      volume = {10},
      number = {3},
      pages = {31-36},
      doi = {10.11648/j.ijiis.20211003.12},
      url = {https://doi.org/10.11648/j.ijiis.20211003.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijiis.20211003.12},
      abstract = {Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify and describe intricate information system. An access Control mechanism is a main strategy for prevention and protection of the classified files in a database; this is carried out by restricting rights of access for different approved users of these files. This paper proposes a novel access control mechanism based on Chinese remainder theorem II which implements a single-key-lock system to encrypt one key called a secret key which is used for both encryption and decryption in the electronic information system for accessing the database. The key to be used in the decryption process must be exchanged between the entities in communication using symmetric encryption for the users to have access to the database. This method represents flocks and keys which is highly efficient and proficient. Also, this implementation can be achieved using the Chinese remainder theorem which executes faster operations and enables simpler construction of keys and locks to be provide for user to have access to control.},
     year = {2021}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II)
    AU  - Aremu Idris Aremu
    AU  - Ibitoye Akinfola Akinrinnola
    AU  - Nwaocha Vivian Ogochukwu
    Y1  - 2021/06/22
    PY  - 2021
    N1  - https://doi.org/10.11648/j.ijiis.20211003.12
    DO  - 10.11648/j.ijiis.20211003.12
    T2  - International Journal of Intelligent Information Systems
    JF  - International Journal of Intelligent Information Systems
    JO  - International Journal of Intelligent Information Systems
    SP  - 31
    EP  - 36
    PB  - Science Publishing Group
    SN  - 2328-7683
    UR  - https://doi.org/10.11648/j.ijiis.20211003.12
    AB  - Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify and describe intricate information system. An access Control mechanism is a main strategy for prevention and protection of the classified files in a database; this is carried out by restricting rights of access for different approved users of these files. This paper proposes a novel access control mechanism based on Chinese remainder theorem II which implements a single-key-lock system to encrypt one key called a secret key which is used for both encryption and decryption in the electronic information system for accessing the database. The key to be used in the decryption process must be exchanged between the entities in communication using symmetric encryption for the users to have access to the database. This method represents flocks and keys which is highly efficient and proficient. Also, this implementation can be achieved using the Chinese remainder theorem which executes faster operations and enables simpler construction of keys and locks to be provide for user to have access to control.
    VL  - 10
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Computer Science Department, School of Technology, Lagos State Polytechnic, Ikorodu, Lagos, Nigeria

  • Computer Science Department, School of Technology, Lagos State Polytechnic, Ikorodu, Lagos, Nigeria

  • Computer Science Department, Faculty of Science, Nigeria Open University, Ikorodu, Lagos, Nigeria

  • Sections